Category: Featured
Tech Time Warp: Chernobyl, the first malware known to damage computer hardware
This installment of Tech Time Warp looks back as the fast‑approaching 40th anniversary of the Chernobyl nuclear accident—along with a new report on damage to the defunct facility’s outer protective structure—calls to mind an anniversary in malware history. The fast-approaching...
Survey: The AI shift is redefining the role of MSPs
A survey of 1,224 business leaders suggests organizations will soon be relying on managed service providers (MSPs) more than ever to drive technological innovation in the age of artificial intelligence (AI). Conducted by International Data Corp (IDC) on behalf of...
How MSPs can use marketing automation to achieve sales goals faster
Key Takeaways Marketing automation eliminates inconsistent follow-up that slows revenue. CRMs, like HubSpot, tie marketing engagement directly to sales execution. Lead scoring helps sales teams focus on real buying signals. Workflow triggers prevent pipeline gaps before they impact results. AI...
How MSPs can convey threats without the panic
Managed service providers encounter a steady stream of cyber threats, and communicating those risks to clients is both an art and a diplomatic exercise. “The fact is, if I told my clients about every single threat I saw every day,...
Cybersecurity Threat Advisory: Adobe Acrobat Reader zero-day
Reports confirm active exploitation of a previously unknown zero‑day vulnerability in Adobe Acrobat Reader since at least December 2025. Attackers are delivering malicious PDF files via phishing and other social engineering methods to achieve remote code execution when the file...
Cybersecurity Threat Advisory: Ransomware turning off EDR with vulnerable drivers
Qilin and Warlock (also known as “Water Manaul”) ransomware groups are using bring your own vulnerable driver (BYOVD) techniques to disable endpoint security tools on Windows systems. These actors can shut down more than 300 EDR drivers across multiple security...
Cybersecurity Threat Advisory: Storm-1175 exploits zero-days to deploy Medusa ransomware
Storm-1175 is a threat actor using a rapid sequence of zero-day and N-day exploits to deploy Medusa ransomware against internet-facing assets. This high-velocity attack pattern has been highlighted by security researchers, who emphasize the heightened risk posed by exposed perimeter...
Pioneers in Tech: Frances “Poppy” Northcutt, the first woman in Mission Control
All eyes have been on Artemis 2 this week and its many firsts. These include the first woman to fly to the moon (Christina Koch) and the first female launch director of a crewed launch (Charlie Blackwell-Thompson). That’s why this...
Cybersecurity Threat Advisory: Active exploitation of Fortinet SQL injection vulnerability
Fortinet has issued urgent security guidance following the active exploitation of a critical SQL injection vulnerability affecting FortiClient Enterprise Management Server (EMS). The flaw allows unauthenticated attackers to achieve remote code execution through specially crafted HTTP requests sent to the...
Cybersecurity Threat Advisory: Axios NPM compromised by supply chain attack
The widely used HTTP client Axios was compromised recently in an incident that many researchers are attributing to a North Korean–linked cyberattack. Attackers gained access to the NPM account of an Axios maintainer, “jasonsaayman,” and published two malicious versions of...
